First published: Fri Apr 17 2009(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.geronimo.plugins:console | <2.1.4 | 2.1.4 |
Red Hat Geronimo | =2.1 | |
Red Hat Geronimo | =2.1.1 | |
Red Hat Geronimo | =2.1.2 | |
Red Hat Geronimo | =2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0039 is considered a high severity vulnerability due to its potential for remote attackers to hijack administrative sessions.
To remediate CVE-2009-0039, upgrade to Apache Geronimo version 2.1.4 or later.
CVE-2009-0039 affects Apache Geronimo versions 2.1, 2.1.1, 2.1.2, and 2.1.3.
CVE-2009-0039 can allow remote attackers to hijack actions such as changing the web administration password or uploading applications.
Yes, CVE-2009-0039 enables attackers to perform actions as authenticated administrators without proper authorization.